Sciweavers

1050 search results - page 45 / 210
» Two methods of authenticated positioning
Sort
View
CSFW
2009
IEEE
15 years 6 months ago
ASPIER: An Automated Framework for Verifying Security Protocol Implementations
Abstract. We present aspier – the first framework that combines software model checking with a standard protocol security model to analyze authentication and secrecy properties ...
Sagar Chaki, Anupam Datta
ICIP
2007
IEEE
15 years 6 months ago
Palmprint Verification using Complex Wavelet Transform
Palmprint is a unique and reliable biometric characteristic with high usability. With the increasing demand of automatic palmprint authentication systems, the development of accur...
Lei Zhang, Zhenhua Guo, Zhou Wang, David Zhang
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 3 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
TKDE
2010
182views more  TKDE 2010»
14 years 10 months ago
MILD: Multiple-Instance Learning via Disambiguation
In multiple-instance learning (MIL), an individual example is called an instance and a bag contains a single or multiple instances. The class labels available in the training set ...
Wu-Jun Li, Dit-Yan Yeung
ICRA
2009
IEEE
129views Robotics» more  ICRA 2009»
15 years 6 months ago
Novel parameter estimation schemes in microsystems
— This paper presents two novel estimation methods that are designed to enhance our ability of observing, positioning, and physically transforming the objects and/or biological s...
Hakan Bilen, Muhammet A. Hocaoglu, Eray A. Baran, ...